Advances in Cryptology - CRYPTO '99
By

Rating

Product Description
Product Details

Promotional Information

Springer Book Archives

Table of Contents

Public-Key Cryptanalysis I.- On the Security of RSA Padding.- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.- Invited Lecture.- Information-Theoretic Cryptography.- Secure Communication and Computation.- Information Theoretically Secure Communication in the Limited Storage Space Model.- The All-or-Nothing Nature of Two-Party Secure Computation.- Distributed Cryptography.- Adaptive Security for Threshold Cryptosystems.- Two Party RSA Key Generation.- Robust Distributed Multiplication without Interaction.- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting.- Secret-Key Cryptography.- Truncated Differentials and Skipjack.- Fast Correlation Attacks Based on Turbo Code Techniques.- Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s Inequality.- Message Authentication Codes.- UMAC: Fast and Secure Message Authentication.- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions.- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions.- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier.- Public-Key Cryptanalysis II.- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97.- Weakness in Quaternion Signatures.- Cryptanalysis of “2R” Schemes.- Factoring N = p r q for Large r.- Traitor Tracing.- An Efficient Public Key Traitor Tracing Scheme.- Dynamic Traitor Tracing.- Efficient Methods for Integrating Traceability and Broadcast Encryption.- Differential Power Analysis.- Differential Power Analysis.- Towards Sound Approaches to Counteract Power-Analysis Attacks.- Signature Schemes.- Separability andEfficiency for Generic Group Signature Schemes.- A Forward-Secure Digital Signature Scheme.- Abuse-Free Optimistic Contract Signing.- Zero Knowledge.- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.- On Concurrent Zero-Knowledge with Pre-processing.- Asymmetric Encryption.- On the Security Properties of OAEP as an All-or-Nothing Transform.- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization.- Secure Integration of Asymmetric and Symmetric Encryption Schemes.- Electronic Cash.- Auditable, Anonymous Electronic Cash.- Protocols and Broadcasting.- Oblivious Transfer with Adaptive Queries.- Compressing Cryptographic Resources.- Coding Constructions for Blacklisting Problems without Computational Assumptions.- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.

Ask a Question About this Product More...
 
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top